2) Request a proposal for a private class for your group at your location or in one of our classrooms.

3) Purchase a self-paced, at home, online computer certification course (Request more information by completing the form on the right).

Some of the courses that we offer are listed below:

-Certified Ethical Hacker (CEH) Training:

The Certified Ethical Hacker (CEH) is the newest certification under the DoD 8570 Directive. Certified Ethical Hacker (CEHv8) Version 8 is a very hands-on five day boot camp course that explores the tactics commonly used to penetrate a network.

-Security + Training:

Security+ takes the first step in teaching you to implement and monitor security on networks and computer systems, and respond to security breaches in the appropriate manner.

The CISSP is a certification created by the International Information Systems Security Certification Consortium, Inc., (ISC)². Government agencies, government contractors (especially DOD), companies and organizations worldwide must have staff that have a common knowledge platform for and demonstrate competence in information security. (ISC)² helps fulfill these requirements with the CISSP.

-Advanced Penetration Testing (APT) Training:

Students that are Network/System Administrators with three (3) or more years of experience working in environments such as financial institutions, DoD networks, or similar high security environments will benefit greatly from this APT course. It is however primarily designed for Network/Web Application Penetration testers that are looking for the little tricks that will help them better attack high security environments.

– Cyber Security Training:

This class was written by a team of IT security and security training’s most respected professionals. This group of industry professionals were looking to create a course that dissects the art of hacking and creates professionals who deeply understand the “whys” of penetration testing /exploitation so that all traditional barriers can be broken.

– Computer Forensics Training (CHFI):

This class is an industry leading, internationally awarded Computer Hacking Forensics Investigator training course that will apply hands-on lab work to help students comprehend the processes of detecting hacker attacks and to gather the evidence required to be able to report the on-line crime and potentially take the criminal down for their attack. The CHFI certification class also conducts activities to help secure a network and prevent against network intrusion.

– Exploit Development Training:

This two week course, taught by Saumil Shah, combines the two most popular exploit development training seminars that are offered at industry conferences around the world, but are always sold out; Exploit Dev: No Assembly Required & Exploit Dev: Black OPs.

– Wireless Security Training:

The Advanced Wireless Security (AWS) course is the leading wireless security training class in the industry and was written under the guidance of three extremely respected industry professionals, Anthony Williams, Joe McCray and Vivek Ramachandran.

– Malware Analysis/Reverse Engineering (AMA) Training:

This class covers a wide variety of malware, from native Windows executables, to web-based malware with numerous types of obfuscation, students will take a hands-on approach to learn how to reverse-engineer malicious code using system/network monitoring utilities, debuggers, disassemblers and a handful of perl/python/ruby scripts.

San Diego, California (CA) is known as one of (if not the) nicest cities in the United States. San Diego has a strong, technology driven economy, perfect weather, beautiful beaches and low crime. The entire metro area of San Diego is a little over 3 million people.

The technology and IT community in San Diego, CA is strong and is centered around the heavy military presence in the area. The US Navy employs many people both active duty and civilian contractors in the IT field. With this large IT presence, there is a strong need for computer and IT security training classes.